Content deleted Content added
kek Tags: references removed repeating characters Possible vandalism |
ClueBot NG (talk | contribs) m Reverting possible vandalism by 194.81.79.56 to version by InternetArchiveBot. Report False Positive? Thanks, ClueBot NG. (3303924) (Bot) |
||
Line 6:
Notable acts of data theft include those by leaker [[Chelsea Manning]] and self-proclaimed whistleblowers [[Edward Snowden]] and [[Hervé Falciani]].
==Data theft methods==
The phrase ''data theft'' is actually a misnomer, since unlike [[theft]] the typical data theft methods typically do not deprive the owner of their data, but rather create an additional, unauthorized copy.
===Thumbsucking===
Thumbsucking, similar to podslurping, is the intentional or undeliberate use of a portable [[USB mass storage device class|USB mass storage device]], such as a [[USB flash drive]] (or "thumbdrive"), to illicitly download confidential data from a network endpoint.<ref>{{cite web|url=http://www.thumbsuckingthreat.com/index.html |title=Do you know who is sucking data from your computer? |accessdate=15 February 2015 |deadurl=yes |archiveurl=https://web.archive.org/web/20070819080552/http://www.thumbsuckingthreat.com/index.html |archivedate=August 19, 2007 }}</ref>
A USB flash drive was allegedly used to remove without authorization highly classified documents about the design of U.S. nuclear weapons from a vault at Los Alamos.<ref>[http://rawstory.com/showoutarticle.php?src=http%3A%2F%2Fwww.time.com%2Ftime%2Fprintout%2F0%2C8816%2C1612912%2C00.html Zagorin, Adam "A breach in nuclear security."] Time, April 19, 2007. Retrieved April 21, 2007</ref>
The threat of thumbsucking has been amplified for a number of reasons, including the following:
*The storage capacity of portable USB storage devices has increased.
*The cost of high-capacity portable USB storage devices has decreased.
*Networks have grown more dispersed, the number of remote network access points has increased and methods of network connection have expanded, increasing the number of vectors for network infiltration.
==Investigating data theft==
|